Lyrie
← Home

#research

28 stories tagged.

arXiv cs.CR: AutoRISE: Agent-Driven Strategy Evolution for Red-Teaming Large Language Models

1 min · 3 sources

arXiv cs.CR: DeepSignature: Digitally Signed, Content-Encoding Watermarks for Robust and Transparent Image Authentication

1 min · 3 sources

arXiv cs.CR: From Language to Logic: Bridging LLMs & Formal Representations for RTL Assertion Generation

1 min · 3 sources

arXiv cs.CR: Module Lattice Security (Part II): Module Lattice Reduction via Optimal Sign Selection

1 min · 3 sources

arXiv cs.CR: Reconstructive Authority Model: Runtime Execution Validity Under Partial Observability

1 min · 3 sources

arXiv cs.CR: Risk Models as Mediating Artifacts: A Postphenomenological Analysis of the CIIM Framework in Cybersecurity Practice

1 min · 3 sources

arXiv cs.CR: RouteGuard: Internal-Signal Detection of Skill Poisoning in LLM Agents

1 min · 3 sources

arXiv cs.CR: Secure eFPGA-Enabled Edge LLM Inference: Architectural and Hardware Countermeasures

1 min · 3 sources

arXiv cs.CR: Self-Supervised Learning for Android Malware Detection on a Time-Stamped Dataset

1 min · 3 sources

arXiv cs.CR: Training a General Purpose Automated Red Teaming Model

1 min · 3 sources

arXiv cs.CR: Automation-Exploit: A Multi-Agent LLM Framework for Adaptive Offensive Security with Digital Twin-Based Risk-Mitigated Exploitation

1 min · 3 sources

arXiv cs.CR: Behavioral Canaries: Auditing Private Retrieved Context Usage in RL Fine-Tuning

1 min · 3 sources

arXiv cs.CR: Can SOC Operators Explain their Decisions while Triaging Alarms? A Real-World Study

1 min · 3 sources

arXiv cs.CR: FixV2W: Correcting Invalid CVE-CWE Mappings with Knowledge Graph Embeddings

1 min · 3 sources

arXiv cs.CR: Introducing the Cyber-Physical Data Flow Diagram to Improve Threat Modelling of Internet of Things Devices

1 min · 3 sources

arXiv cs.CR: PrivSTRUCT: Untangling Data Purpose Compliance of Privacy Policies in Google Play Store

1 min · 3 sources

arXiv cs.CR: Resource-Aware Layered Intrusion Detection Allocation Model

1 min · 3 sources

arXiv cs.CR: Sovereign Agentic Loops: Decoupling AI Reasoning from Execution in Real-World Systems

1 min · 3 sources

arXiv cs.CR: Train in Vain: Functionality-Preserving Poisoning to Prevent Unauthorized Use of Code Datasets

1 min · 3 sources

arXiv cs.CR: Who Audits the Auditor? Tamper-Proof Fraud Detection with Blockchain-Anchored Explainable ML

1 min · 3 sources

Project Zero: On the Effectiveness of Mutational Grammar Fuzzing

1 min · 3 sources

Project Zero: A Deep Dive into the GetProcessHandleFromHwnd API

1 min · 3 sources

Project Zero: Bypassing Administrator Protection by Abusing UI Access

1 min · 3 sources

Project Zero: Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529

1 min · 3 sources

Project Zero: Bypassing Windows Administrator Protection

1 min · 3 sources

Project Zero: A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

1 min · 3 sources

Project Zero: Welcome to the new Project Zero Blog

1 min · 3 sources

Project Zero: Thinking Outside The Box [dusted off draft from 2017]

1 min · 3 sources